Multi-factor authentication

Results: 297



#Item
131Cryptographic protocols / Tunneling protocols / Internet protocols / Computer security / IPsec / Authentication / SecurID / Password / Multi-factor authentication / Security / Cryptography / Access control

Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Perficient, Inc. Security 101 Security Core Concepts...

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-04-03 21:12:11
132Security / Federated identity / Identity assurance / OpenID / Security Assertion Markup Language / Authentication / Multi-factor authentication / Identity provider / National Strategy for Trusted Identities in Cyberspace / Identity management / Identity / Computer security

Remarks of Catherine Tilton at the Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC)

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:54
133Identity management / Security token / Password / Authentication / Multi-factor authentication / One-time password / Strong authentication / Two-factor authentication / Password manager / Security / Computer security / Access control

Microsoft Word - Authentication Manager-39 A2 79LV 04.doc

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2013-06-26 02:06:21
134Speaker recognition / Keystroke dynamics / Authentication / Password / Multi-factor authentication / Challenge-response authentication / One-time password / Finger vein recognition / Biometrics Institute / Security / Biometrics / Access control

Myths and Misunderstandings about Speaker Authentication A white paper by Dr. Judith A. Markowitz, president J. Markowitz, Consultants Introduction Speaker authentication is a biometric technology that uses the acoustic

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:54
135Surveillance / Two-factor authentication / Multi-factor authentication / PerSay / Nuance Communications / Keystroke dynamics / Iris recognition / CBEFF / Biometrics Institute / Biometrics / Security / Access control

CONFIDENTIAL Monitoring Report – February, 2007 J. Markowitz, Consultants Program A: Competitive Landscape and Standards Activities This report is confidential and intended for registered JMC clients only Competitive L

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:53
136Identification / Surveillance / Two-factor authentication / Password / Authentication / Multi-factor authentication / Single sign-on / Private biometrics / Biometric points / Security / Access control / Biometrics

Securing self-service telephone applications white paper by J. Markowitz, Consultants JC

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:54
137Roboform / Identity management / Password / One-time password / Multi-factor authentication / Access control / Security / Computer security

SIBER SYSTEMS ANNOUNCES MULTIFACTOR AUTHENTICATION FOR ROBOFORM® PASSWORD MANAGER Free Feature, Offered on Opt-In Basis, Allows Users to Verify Trusted PCs, Laptops and Mobile Devices for Repeated Use with World’s #1

Add to Reading List

Source URL: www.roboform.com

Language: English
138Biometrics / Identification / Surveillance / Authentication / Password / Identity document / Fingerprint / Multi-factor authentication / SecurID / Security / Access control / Cryptography

Biometrics - problem or solution ?

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:49:55
139Access control / Identity management / Internet privacy / Network architecture / Two-factor authentication / Security token / Password / Multi-factor authentication / Authentication / Security / Computer security / Computer network security

White paper Two-factor.. Authentication.. Combining multiple authentication mechanisms for a higher degree of security

Add to Reading List

Source URL: www.fedtechmagazine.com

Language: English - Date: 2015-04-08 13:44:52
140Two-factor authentication / Password / Phishing / One-time password / Mutual authentication / Authentication / Security token / Multi-factor authentication / Password manager / Security / Access control / Computer security

Identity Cues Two Factor Data Sheet

Add to Reading List

Source URL: www.greenarmor.com

Language: English - Date: 2006-11-03 09:40:00
UPDATE